Access to Networks. (a) Each Party may provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, as necessary to provide or receive the Services, as applicable; provided, that the cost of providing access shall be charged in accordance with Section 4.1. (b) Each Party shall only use (and will ensure that its Personnel only use) the other Party’s Network for the purpose of providing or receiving, and only to the extent required to provide or receive, the Services. (c) Neither Party shall allow nor permit its agents or subcontractors to use or have access to the other Party’s Network except to the extent that such other Party gives its express prior written approval for such use or access by each relevant agent or subcontractor. (d) Neither Party shall (and shall ensure that its Personnel shall not): (i) use the other Party’s Network to develop software, process data or perform any work or services other than for the purpose of providing or receiving the Services, (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the other Party; (iii) obtain, or attempt to obtain, access to any hardware, program or data comprised in the other Party’s Network except to the extent reasonably necessary to perform or receive the Services; or to which such other Party has given its prior written consent for such Party to obtain or attempt to obtain such access; or (iv) use, disclose or give access to any part of the other Party’s Network to any third party, other than its agents and sub-contractors authorized by such other Party in accordance with this Section 5.1. All user identification numbers and passwords for a Party’s Network disclosed to the other Party, and any information obtained from the use of such Party’s Network, shall be deemed Confidential Material of such Party. (e) If a Party or any of its Personnel breach any provision of this Article, such Party shall promptly notify the other Party of such breach and cooperate as requested by such other Party in any investigation of such breach. (f) A material failure to comply with the provisions of this Section 5.1 shall constitute a material breach of this Agreement.
Appears in 2 contracts
Samples: Transition Services Agreement (Primerica, Inc.), Transition Services Agreement (Primerica, Inc.)
Access to Networks. (a) Each Party may must provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, as necessary to provide or receive the Services, as applicable; provided, that no Party shall be required to accept a method selected by the other Party to the extent that such method would require such Party to violate its generally applicable policies and procedures; and provided further that the cost of providing access shall be charged in accordance with borne by CitiLife pursuant to Section 4.1.
(b) Each Party agrees to take all reasonable steps to prevent the unauthorized or illegal access to the Network of the other Party.
(c) Each Party shall only use (and will use its best efforts to ensure that its Personnel only use) the other Party’s Network for the purpose of providing or receiving, and only to the extent required to provide or receive, the Services, as applicable.
(cd) Neither Party shall allow nor permit its agents or subcontractors to use or have access to the other Party’s Network except to the extent that such other Party gives its express prior written approval for such use or access by each relevant agent or subcontractor.
(de) Neither Party shall (and shall use its best efforts to ensure that its Personnel shall not): (i) use the other Party’s Network to develop software, process data or perform any work or services other than for the purpose of providing or receiving the Services, (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the other Party; (iii) obtain, or attempt to obtain, access to any hardware, program or data comprised in the other Party’s Network except to the extent reasonably necessary to perform or receive the Services; or to which such other Party has given its prior written consent for such Party to obtain or attempt to obtain such access; or (iv) use, disclose or give access to any part of the other Party’s Network to any third party, other than its agents and sub-contractors authorized by such other Party in accordance with this Section 5.1. All user identification numbers and passwords for a Party’s Network disclosed to the other Party, and any information obtained from the use of such Party’s Network, shall be deemed Confidential Material of such Party.
(e) If a Party or any of its Personnel breach any provision of this Article, such Party shall promptly notify the other Party of such breach and cooperate as requested by such other Party in any investigation of such breach.
(f) A material failure to comply with the provisions of this Section 5.1 shall constitute a material breach of this Agreement.data
Appears in 1 contract
Access to Networks. (a) Each Party may must provide the other Party with access to such Party’s Network via a secure, industry-standard method selected by such Party with reasonable input from such other Party, as necessary to provide or receive the Services, as applicable; provided, that no Party shall be required to accept a method selected by the other Party to the extent that such method would require such Party to violate its generally applicable policies and procedures; and provided further that the cost of providing access shall be charged in accordance with borne by CitiLife pursuant to Section 4.1.
(b) Each Party agrees to take all reasonable steps to prevent the unauthorized or illegal access to the Network of the other Party.
(c) Each Party shall only use (and will use its best efforts to ensure that its Personnel only use) the other Party’s Network for the purpose of providing or receiving, and only to the extent required to provide or receive, the Services, as applicable.
(cd) Neither Party shall allow nor permit its agents or subcontractors to use or have access to the other Party’s Network except to the extent that such other Party gives its express prior written approval for such use or access by each relevant agent or subcontractor.
(de) Neither Party shall (and shall use its best efforts to ensure that its Personnel shall not): (i) use the other Party’s Network to develop software, process data or perform any work or services other than for the purpose of providing or receiving the Services, (ii) break, interrupt, circumvent, adversely affect or attempt to break, interrupt, circumvent or adversely affect any security system or measure of the other Party; (iii) obtain, or attempt to obtain, access to any hardware, program or data comprised in the other Party’s Network except to the extent reasonably necessary to perform or receive the Services; or to which such other Party has given its prior written consent for such Party to obtain or attempt to obtain such access; or (iv) use, disclose or give access to any part of the other Party’s Network to any third party, other than its agents and sub-contractors authorized by such other Party in accordance with this Section 5.1. All user identification numbers and passwords for a Party’s Network disclosed to the other Party, and any information obtained from the use of such Party’s Network, shall be deemed Confidential Material of such Party.
(ef) If a Party or any of its Personnel breach any provision of this Article, such Party shall promptly notify the other Party of such breach and cooperate as requested by such other Party in any investigation of such breach.
(fg) A material failure to comply with the provisions of this Section 5.1 shall constitute a material breach of this Agreement.
Appears in 1 contract